Control and management of electronic messaging

a technology of electronic messaging and control, applied in the field of electronic messaging, can solve the problems of clogging users' electronic storage devices, wasting users' time, and affecting the popularity of electronic messaging such as e-mail,

Active Publication Date: 2010-03-09
VERISIGN
View PDF29 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The popularity of electronic messaging such as e-mail is being marred by ever increasing amount of unsolicited messages (commonly known as “spam”) that is received by users.
Spam can waste users' time, can clog users' electronic storage devices, and its shear volume can make it difficult for a user to identify messages that the user wants receive.
In the process of deleting spam, a user can inadver...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control and management of electronic messaging
  • Control and management of electronic messaging
  • Control and management of electronic messaging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008]In one embodiment of the present invention, a referee is used to discriminate desirable from undesirable messages. An example of this embodiment involving e-mail messages is shown in FIG. 1, which depicts several e-mail senders Sender A, B, several e-mail recipients Receiver, and a referee Referee. The present invention is equally applicable to any other kind of message, such as telephone messages, unwanted advertisements in television signals, etc. A sender can associate a credential (e.g., a digital signature, a digital certificate, etc.) with a message. A credential is a statement whose authenticity can be verified, and that is resistant to unauthorized modification, i.e., it's integrity has not been compromised. For example, the statements “The sender of this e-mail is Joseph Smith, 100 ABC Way, Sometown, N.Y. 14593” and “The sender of this e-mail has sent 3,562 e-mails in the past hour.” can be hashed (e.g., using the MD5 algorithm), and the resulting hash can be signed b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for controlling a message from a sender. A referee can evaluate a credential associated with a message to determine it's desirability to the intended recipient, and take an action based upon the results of the determination. A sender that includes a trusted component can send a credential with the message, and the message can be controlled without a referee.

Description

FIELD OF THE INVENTION[0001]The field of the invention is electronic messaging, and in particular the control and management of electronic messaging.BACKGROUND OF THE INVENTION[0002]The popularity of electronic messaging such as e-mail is being marred by ever increasing amount of unsolicited messages (commonly known as “spam”) that is received by users. Spam can waste users' time, can clog users' electronic storage devices, and its shear volume can make it difficult for a user to identify messages that the user wants receive. In the process of deleting spam, a user can inadvertently delete wanted messages. Spam can contain advertisements (e.g., such as Unsolicited Commercial E-Mail (“UCE”)); deceptive and / or unlawful offers; viruses; spyware; offensive content; and other undesirable forms of information. Vast numbers of spam messages can be sent for little or no cost to their sender (“spammer”), who can take various actions to hide his true identity. For example, spammers often forg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F15/16G06F7/00H04L9/00G06FG06F17/30H04L9/32H04L12/54H04L12/58
CPCH04L12/585H04L63/08H04L65/1079H04L51/12H04L51/212
Inventor HALLAM-BAKER, PHILLIP MARTIN
Owner VERISIGN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products